Is it really? I mean, he would be of great help, no doubts about it, but he didn`t do much anyway. He just started checking the PS3, noticed it wasn`t all that simple and sort of lost interest.

I was too following his post on twitter and the impression I got is that he expected something simpler and faster to do. As no exploit was easily found and he wasn`t finding ways to get to the hypervisor, he kinda gave up for the time being. That`s only my impression though...

Is it really? I mean, he would be of great help, no doubts about it, but he didn`t do much anyway. He just started checking the PS3, noticed it wasn`t all that simple and sort of lost interest.

I was too following his post on twitter and the impression I got is that he expected something simpler and faster to do. As no exploit was easily found and he wasn`t finding ways to get to the hypervisor, he kinda gave up for the time being. That`s only my impression though...

What I meant is that even if you were able to retrieve the keys from hardware they would be the public keys usable for decrypting the binaries or verifying digital signatures. These keys cannot be used for encrypting/signing binaries (yours - i.e. patched/hacked/...) in a way that would allow you to run them.

Thanks for the reply, but I still have a few other questions:

What about the keys used by the PS3 to encrypt data, like the HDD? I assume this keys must be stored somewhere inside the PS3, am I right? Isn`t it possible to retrieve them?

And the keys used by Sony to encrypt and sign their software, can`t them be retrieved from files such as a firmware update? That is, if we could read them.

Sorry if I`m being annoying with all those questions, I`m just trying to learn something about encryption/decryption.